Althebyan Qutaibah

Althebyan Qutaibah
Al Ain University · Faculty of Engineering

Doctor of Philosophy
Dean of Engineering

About

38
Publications
11,347
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
431
Citations
Citations since 2017
17 Research Items
328 Citations
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
Additional affiliations
January 2005 - August 2008
University of Arkansas
Position
  • Research Assistant

Publications

Publications (38)
Article
Roundabouts are introduced at intersections to improve traffic flow and enhance safety. Nevertheless, studies and field observations demonstrated that roundabouts, due to their special design, could significantly affect the efficiency of the overall traffic network, especially in the case of increased traffic volumes. For this reason, researchers a...
Article
Full-text available
Academic advising is a time-consuming activity that takes a considerable effort in guiding students to improve student performance. Traditional advising systems depend greatly on the effort of the advisor to find the best selection of courses to improve student performance in the next semester. There is a need to know the associations and patterns...
Preprint
Full-text available
Academic advising is a time-consuming activity that takes a considerable effort in guiding students to improve students' performance. Traditional advising systems depend greatly on the effort of the advisor to find the best selection of courses to improve students' performance in the next semester. There is a need to know the associations and patte...
Article
Insider Threats, who are cloud internal users, cause very serious problems, which in terns, leads to devastating attacks for both individuals and organizations. Although, most of the attentions, in the real world, is for the outsider attacks, however, the most damaging attacks come from the Insiders. In cloud computing, the problem becomes worst in...
Article
Security of cloud computing is a major concern for both organisations and individuals. The cloud users want to make sure that their private data will be safe from disclosure of both outsiders of the cloud as well as from (probably malicious) insiders (cloud agents) of the cloud. Hence, insiders' threats of the cloud computing is a major issue that...
Article
Security of cloud computing is a major concern for both organisations and individuals. The cloud users want to make sure that their private data will be safe from disclosure of both outsiders of the cloud as well as from (probably malicious) insiders (cloud agents) of the cloud. Hence, insiders’ threats of the cloud computing is a major issue that...
Conference Paper
Full-text available
The zero-day attack in networks exploits an undiscovered vulnerability, in order to affect/damage network or programs. The term “zero-day” refers to the number of days available to the software or hardware vendor to issue a patch for this new vulnerability. Currently, the best-known defense mechanism against the zero-day attacks focuses on detectio...
Article
Early detection of biological attacks is vital for alleviating their effects and protecting human lives. Current biosurveillance systems rely on the complex processing of large volumes of data available from multiple sources such as hospitals, clinics and medical laboratories. As these systems are intended to monitor large-scale environments, they...
Article
Full-text available
The request-response paradigm that consists of policy decision points (PDPs) and policy enforcement points (PEPs) is used for access control in Cloud computing. The model uses PEP-side caching to increase the availability and reduce the processing overhead on PDP. This paper shows that using PEP-side caching can be exploited by insiders to bypass c...
Article
he Map Reduce paradigm is now considered a standard platform that is used for large scale data processing and management. A major operation that the Map Reduce platform relies on greatly is tasks scheduling. Although many schedulers have been presented, task scheduling is still one of the major problems that face Map Reduce frameworks. Schedulers n...
Article
The Map Reduce paradigm is now considered a standard platform that is used for large-scale data processing and management. A major operation that the Map Reduce platform relies on greatly is tasks scheduling. Although many schedulers have been presented, task scheduling is still one of the major problems that face Map Reduce frameworks. Schedulers...
Article
With the goal of efficient sharing of resources and services, the cloud computing paradigm has gained a lot of interest recently. This work focuses on improving the resource utilisation by optimising the resource provisioning through a multi-agent framework in which different agents are responsible for different tasks including the monitoring of cu...
Article
Rapid development of wearable devices and mobile cloud computing technologies has led to new opportunities for large scale e-healthcare systems. In these systems, individuals’ health information are remotely detected using wearable sensors and forwarded through wireless devices to a dedicated computing system for processing and evaluation where a s...
Conference Paper
Most security related research for cloud computing focuses on attacks generated outside the cloud system. However, insider attackers are more challenging and can cause severe impacts on the cloud system stability and quality of service. In this paper, we propose an insider threat model using a knowledgebase approach. Knowledgebase models were used...
Article
Cloud security has become one of the emergent issues because of the immense growth of cloud services. A major concern in cloud security is the insider threat because of the harm that it poses. Therefore, defending cloud systems against insider attacks has become a key demand. This work deals with insider threat in cloud relational database systems....
Article
Efficiently scheduling MapReduce tasks is considered as one of the major challenges that face MapReduce frameworks. Many algorithms were introduced to tackle this issue. Most of these algorithms are focusing on the data locality property for tasks scheduling. The data locality may cause less physical resources utilization in non-virtualized cluster...
Conference Paper
Most of the security related research for cloud computing focuses on attacks that are generated outside the cloud system and aims to gain unauthorized access to the cloud resources and data. However, the insider attackers are more challenging and can cause a severe impact on the cloud system stability and quality of service. In this paper, we propo...
Article
The cloud computing paradigm provides a shared pool of resources and services with different models delivered to the customers through the Internet via an on-demand dynamically-scalable form charged using a pay-per-use model. The main problem we tackle in this paper is to optimize the resource provisioning task by shortening the completion time for...
Article
Full-text available
In an academic environment, student advising is considered a paramount activity for both advisors and student to improve the academic performance of students. In universities of large numbers of students, advising is a time-consuming activity that may take a considerable effort of advisors and university administration in guiding students to comple...
Conference Paper
The cloud computing paradigm provides a shared pool of resources and services with different models deliv-ered to the customers through the Internet via an on-demand dynamically-scalable form charged using a pay-per-use model. The main problem we tackle in this paper is to optimize the resource provisioning task by shortening the completion time fo...
Conference Paper
Efficiently scheduling Map Reduce tasks is considered as one of the major challenges that face Map Reduce frameworks. Many algorithms were introduced to tackle this issue. Most of these algorithms are focusing on the data locality property for tasks scheduling. The data locality may cause less physical resources utilization in non-virtualized clust...
Conference Paper
Map Reduce is a parallel and a distributed computing framework used to process datasets that have large scale nature on a cluster. Due to the nature of data that needs to be handled in the Map Reduce problem which involves huge amount of data, many problems came up that are of great importance. Scheduling tasks is considered one of these major prob...
Conference Paper
PEP-side caching is used in request-response access control mechanisms to increase the availability and reduce the processing overhead on PDP. Nonetheless, this paper shows that using this approach may open an insider threat port that can be used to bypass access control models in cloud and distributed relational databases. Moreover, the paper prop...
Article
Full-text available
Context. Software metrics are surrogates of software quality. Software metrics can be used to find possible problems or chances for improvements in software quality. However, software metrics are numbers that are not easy to interpret. Previous analysis of software metrics has shown fat tails in the distribution. The skewness and fat tails of such...
Article
Full-text available
Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks are those that come from outside the system, however, insider attacks are those that are launched from insiders of the system. In this paper we concentrate on insider attacks detection on the application level; database is our focus. Insider attacks dif...
Conference Paper
In this work, we presented an approach to extract knowledge out of an object. A graph theory approach to represent and manage the knowledge is explained. We then presented a performance analysis for an insider threat mitigation model proposed earlier. We relied on some characteristics of the insiders and the decomposition of objects in the underlyi...
Conference Paper
Many consider insider attacks to be more severe than outsider attacks due to the nature of such attacks that involve people who have knowledge of their own organization. In this work, we presented a new model to evaluate and analyze a system after the occurrence of an insider attack. By evaluating and analyzing the system after detecting such attac...
Conference Paper
Many consider insider attacks to be more severe and devastating than outsider attacks. Many techniques exist for defending against outsider attacks. However, little work has been presented for defending insider attacks and threats. In this work, we presented a prediction technique for insider threats. Due to the nature of these kinds of attacks, we...
Article
In this paper we present a strategy for tracking multiple moving targets with multiple mobile sensors. The strategy generates movements of the sensors such that the sum of their mutually exclusive detections for the next T time samples is optimal. The sensors sense a rectangular surveillance zone and their combined field of vision (FOV) is less tha...
Article
Many consider insider attacks to be more severe than outsider attacks because of the nature of these attacks that involve people who have knowledge of their own organization. According to several studies and statistics, between 61% and 80% of computer crimes are being performed by trusted insiders of organizations. Many techniques exist for defendi...

Network

Cited By